Netinfo Security ›› 2016, Vol. 16 ›› Issue (2): 60-65.doi: 10.3969/j.issn.1671-1122.2016.02.010

• Orginal Article • Previous Articles     Next Articles

IT Assets Safety Monitoring System Based on Huge Data

Hongkai WANG1, Shengjun ZHENG2, Longhua GUO3(), Yun LIU4   

  1. 1. Information and Telecommunication Branch of State Grid Zhejiang Electric Power Company, Hangzhou Zhejiang 310007, China
    2. Beijng GuoDianTong Network Technology Co.,Ltd, Beijing 100070, China
    3. School of Electronic Information and Electric Engineering, Shanghai JiaoTong University, Shanghai 200240, China
    4. State Grid JIBEI Electric Power Company, Beijing 100053, China
  • Received:2015-12-20 Online:2016-02-10 Published:2020-05-13

Abstract:

The emergence of security attack for industrial control networks causes the smart grid which is an important part of the industrial control networks facing huge security threat. The upgrade of information devices increases the possibility for creating isolated islands of information. Confused management of IT assets causes bad influence to the security and stability of information system. Real-time information security situation can be aware through security monitoring means. The detection of IT asset vulnerability and other security issues provide a basis for the development of effective security measures which play significant role in solving security problems in power system. How to deal with huge data is also a valuable topic deserving research. In this paper, we design the IT assets distributed monitoring system based on huge data, to solve increasingly serious problems of IT assets management. It collects IT assets information through hardware component details, ports scanning and the distributed vast web crawler. It constructs distributed engine clusters to implement information acquisition tasks and data processing tasks, implements the IT assets detecting and leaks analyzing effectively and fast. The system can autonomous discover and locate IT assets so that it detects the cyber space comprehensively, accurately and in real time.

Key words: distributed dispatch, IT assets, security monitoring

CLC Number: